Debian Patches

Status for mediawiki/1:1.39.17-1+deb12u2

Patch Description Author Forwarded Bugs Origin Last update
0001-Have-Scribunto-use-packaged-lua5.1-rather-than-bundl.patch Have Scribunto use packaged lua5.1 rather than bundled Kunal Mehta <legoktm@debian.org> not-needed 2020-07-31
0002-Have-SyntaxHighlight-use-packaged-pygmentize-rather-.patch Have SyntaxHighlight use packaged pygmentize, rather than bundled Kunal Mehta <legoktm@debian.org> not-needed 2022-09-25
0003-CVE-2026-34092.patch SECURITY: Ignore autoblocks when setting Skin's toolbox links
CVE-2026-34092

Why:
An autoblock from a user can expose its existence by being found
on a page with the IP as the relevant user

What:
- Only consider a target blocked if the block is not an autoblock
STran <stran@wikimedia.org> no upstream 2025-12-18
0004-CVE-2026-34088.patch SECURITY: Remove suppressed content from log page
CVE-2026-34088

When certain MediaWiki log data is hidden/suppressed, it can be exposed via Special:RecentChanges's html,
via the data-target-page attribute. This change updates data-target-attribute to show the rev-deleted-event
message if the user does not have permissions to view the log data.
Maryum Styles <mstyles@wikimedia.org> no upstream 2026-01-20
0005-CVE-2026-34093.patch SECURITY: Restrict access to interwiki user groups on S:UserRights

CVE-2026-34093

Why:
* Special:UserRights could be used to enumerate users on private
wikis, even if performer has no special permissions.

What:
* If performer has no `userrights-interwiki` permission, redirect them
to the remote wiki for viewing permissions there.
Marcin Szwarc <mszwarc@wikimedia.org> no upstream 2026-01-14
0006-CVE-2026-34095.patch SECURITY: Actions: Make headers set after redirect actually apply

CVE-2026-34095

If a special page redirect is done, the Request object in the context is
set to a DerivativeRequest, which extends from FauxRequest and thus
returns a FauxResponse from WebRequest::response().

This patch updates the actions entry point to copy any headers set in
that FauxResponse object to be applied to the real response object, to
make sure that e.g. the correct Content-Type is set for redirected
action=raw requests.
Taavi Väänänen <taavi@wikimedia.org> no upstream 2026-03-06
0007-CVE-2026-34087.patch SECURITY: Don't leak user's lack of 2FA to other users
CVE-2026-34087

There are some ways that the onUserEffectiveGroups hook can be called
fro a user who is not the currently logged-in user, for example through
the action=query&list=users API. If a user is in a restricted group that
requires 2FA, but doesn't have 2FA enabled, this fact is leaked through
this API and other channels.

To fix this infromation leak, don't modify the user's effective groups
unless the user in question is the user who is logged in. This means
that a user who is a member of a 2FA-requiring group but doesn't have
2FA won't be treated as a member of that group when they are logged in
(and won't be able to take actions restricted to that group), but if
another user asks, we will pretend that the user is in that group.

In particular, this means that users who are in a 2FA-requiring group
but don't have 2FA will still get the group JS and CSS for that group,
because load.php is a session-less endpoint.
Roan Kattouw <roan.kattouw@gmail.com> no upstream 2026-01-22

All known versions for source package 'mediawiki'

Links